Unlock instant, AI-driven research and patent intelligence for your innovation.

A Proxy Anonymous Communication Method Based on Homomorphic Encryption Scheme

A homomorphic encryption and anonymous communication technology, applied in the field of communication security, can solve the problems of low reliability of data information, affecting data confidentiality and availability, reducing the speed and efficiency of data transmission, etc.

Active Publication Date: 2022-03-01
北京通合智能科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the problem with this solution is to anonymize the transmitted data by relying on the forwarding server
The main disadvantage: on the one hand, considering that the forwarding server is reliable, the number of forwarding servers is a key factor. When the number of forwarding servers is small (only one or two), the efficiency of data transmission is reliable and Efficient, but the security of forwarding data in the channel is not guaranteed. Once there are some objective reasons, such as system failure, misoperation, etc., or malicious attackers attack the forwarding server, the ciphertext data Being attacked by a man-in-the-middle seriously affects the confidentiality and availability of data; when the number of forwarding servers is large (three or more), the security of forwarding data in the channel can be guaranteed, but because the final generated ciphertext is The forwarding server forwards it multiple times, but it will reduce the speed and efficiency of data transmission in the entire network system; on the other hand, considering that the forwarding server is unreliable, that is, when the owner sends his private information to the forwarding server At that time, the security can no longer be guaranteed, and the reliability of the data information received by the receiver will be even lower

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Proxy Anonymous Communication Method Based on Homomorphic Encryption Scheme
  • A Proxy Anonymous Communication Method Based on Homomorphic Encryption Scheme
  • A Proxy Anonymous Communication Method Based on Homomorphic Encryption Scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0053] Such as figure 1 As shown, the present invention discloses a proxy-type anonymous communication method based on a homomorphic encryption scheme, including:

[0054] S1. The sender encrypts the target data to obtain ciphertext data c 1 ;

[0055] S2. The sender sends the ciphertext data c 1 sent to the server;

[0056] S3. The server sends the ciphertext data c 1 Perform homomorphic encryption to obtain ciphertext data c 2 ;

[0057] S4. The server sends the ciphertext data c 2 sent to the receiver;

[0058] S5. The receiving end performs the ciphertext data c 2 Decrypt to get the ciphertext data c 1 .

[0059] In the present invention, only the receiver needs to decrypt to obtain the ciphertext data c 1 That’s right, there is no need to convert...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a proxy-type anonymous communication method based on a homomorphic encryption scheme, including: S1. The sending end performs original encryption on target data to obtain ciphertext data c 1 ; S2. The sender sends the ciphertext data c 1 Send to the server; S3, the server sends the ciphertext data c 1 Perform homomorphic encryption to obtain ciphertext data c 2 ; S4, the server sends the ciphertext data c 2 Send to the receiving end; S5, the receiving end compares the ciphertext data c 2 Decrypt to get the ciphertext data c 1 . This method is mainly used for reliable and complete transmission of private data (mainly for location data) of participating vehicles in the Internet of Vehicles, and by improving the security and confidentiality of the location data of participating vehicles in the Internet of Vehicles, the safety of vehicles participating in the Internet of Vehicles is realized. It has certain economic benefits and engineering practicability.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a proxy-type anonymous communication method based on a homomorphic encryption scheme. Background technique [0002] With the specific application of the Internet of Vehicles in the field of smart city transportation, by collecting, distributing and processing the dynamic location data of the vehicle network, and sharing the location data information by means of wireless communication, the realization of vehicle-to-vehicle, vehicle-to-road, vehicle-to-people , information interaction between cars and other infrastructure, so that cars and urban networks are connected to each other. However, due to the contradiction between wireless communication and the high reliability and high security of IoV applications, the location data shared by vehicles is vulnerable to malicious attacks by attackers, which puts a safety belt on vehicles sharing location data in IoV. Here comes the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/00H04L9/08
CPCH04L63/0421H04L63/0428H04L9/008H04L9/0861
Inventor 米波龙萍黄大荣韦天成李阳吴冰清
Owner 北京通合智能科技有限公司